CCNP CCIE Enterprise: ENCOR 350-401 Training Part-2/2
Learn CCNP, CCIE Enterprise ENCORE with Step-by-Step Lab Workbook
IT and Software ,Network and Security,CCNP Enterprise
Lectures -74
Duration -27.5 hours
Lifetime Access
Lifetime Access
30-days Money-Back Guarantee
Get your team access to 10000+ top Tutorials Point courses anytime, anywhere.
Course Description
The CCNP Enterprise ENCOR 350-401 exam is designed to assess your knowledge and skills related to implementing core enterprise network technologies. It includes dual stack (IPv4 and IPv6) architecture, virtualization, infrastructure, network assurance, security, and automation.
This online video course is the second part of a two-part series that will help you prepare for the CCNP Enterprise ENCOR 350-401 exam.
Course Overview
Implementing Cisco Enterprise Network Core Technologies v1.0 (ENCOR 350-401) is associated with the CCNP and CCIE Enterprise Certifications. The course, Implementing Cisco Enterprise Network Core Technologies, helps candidates prepare for this exam.
The curriculum takes you through the following:
1.1 Explain the different design principles used in an enterprise network
1.1.a Enterprise network design such as Tier 2, Tier 3
1.1.b High availability techniques such as redundancy, FHRP
1.2 Analyze design principles of a WLAN deployment
1.2.a Wireless deployment models (centralized, distributed, controller-less, controller-based, cloud, remote branch)
1.2.b Location services in a WLAN design
1.3 Differentiate between on-premises and cloud infrastructure deployments
1.4 Explain the working principles of the Cisco SD-WAN solution
1.4.a SD-WAN control and data plane elements
1.4.b Traditional WAN and SD-WAN solutions
1.5 Explain the working principles of the Cisco SD-Access solution
1.5.a SD-Access control and data plane elements
1.5.b Traditional campus interoperating with SD-Access
1.6 Describe concepts of wired and wireless QoS
1.6.a QoS components
1.6.b QoS policy
2.1 Describe device virtualization technologies
2.1.a Hypervisor type 1 and 2
2.1.b Virtual machine
2.1.c Virtual switching
2.2 Configure and verify data path virtualization technologies
2.2.a VRF
2.2.b GRE and IPsec tunneling
2.3 Describe network virtualization concepts
2.3.a LISP
2.3.b VXLAN
3.1 Wireless
3.3.a Describe Layer 1 concepts, such as RF power, RSSI, SNR, interference noise, band and channels, and wireless client device capabilities
3.3.b Describe AP modes and antenna types
3.3.c Describe access point discovery and join process (discovery algorithms, WLC selection process)
3.3.d Describe the main principles and use cases for Layer 2 and Layer 3 roaming
3.3.e Troubleshoot WLAN configuration and wireless client connectivity issues
3.2 IP Services
3.4.a Describe Network Time Protocol (NTP)
3.4.b Configure and verify NAT/PAT
3.4.c Configure first-hop redundancy protocols, such as HSRP and VRRP
3.4.d Describe multicast protocols, such as PIM and IGMP v2/v3
4.1 Diagnose network problems using tools such as debugs, conditional debugs, traceroute, ping, SNMP, and Syslog
4.2 Configure and verify device monitoring using syslog for remote logging
4.3 Configure and verify NetFlow and Flexible NetFlow
4.4 Configure and verify SPAN/RSPAN/ERSPAN
4.5 Configure and verify IP SLA
4.6 Describe Cisco DNA Center workflows to apply network configuration, monitoring, and management
4.7 Configure and verify NETCONF and RESTCONF
6.1 Interpret basic Python components and scripts
6.2 Construct a valid JSON-encoded file
6.3 Describe the high-level principles and benefits of a data modeling language, such as YANG
6.4 Describe APIs for Cisco DNA Center and vManage
6.5 Interpret REST API response codes and results in payload using Cisco DNA Center and RESTCONF
6.6 Construct an EEM applet to automate configuration, troubleshooting, or data collection
6.7 Compare agent vs. agentless orchestration tools, such as Chef, Puppet, Ansible, and SaltStack
Who this course is for:
Network administrators, Network support technicians, Help desk technicians
Enterprise network engineers, System Engineers, System administrators
Goals
- You will be ready to pass ENCOR exams and get great hands-on experience with our detailed labs.
- Anyone who wants to prepare for the CCNP Enterprise certification exams.
- Anyone who wants to learn routing at a professional level.
- Anyone who wants to prepare for the CCNP exam
- Anyone who wants to prepare for the CCIE Written exam
Prerequisites
- CCNA Routing & Switching Knowledge CCNA 200-125 or CCNA 200-301
- General understanding of network fundamentals
- General knowledge of how to manage network devices.
- Basic knowledge of how to implement LANs and network automation.
- To practice, you must install GNS3, EVE NG, or Packet Tracer applications on your computer.
Curriculum
Check out the detailed breakdown of what’s inside the course
CCNP Enterprise ENCORE 350-401
74 Lectures
- Lecture-69:Introduction and Concept of Border Gateway Protocol (BGP). 22:27 22:27
- Lecture-70:Border Gateway Protocol (BGP) Introduction to AS Number. 43:54 43:54
- Lecture-71:Border Gateway Protocol (BGP) Flavors IBGP and EBGP. 24:30 24:30
- Lecture-72:Border Gateway Protocol (BGP) Three Different Tables. 12:09 12:09
- Lecture-73:Border Gateway Protocol (BGP) Active and Passive. 22:38 22:38
- Lecture-74:Border Gateway Protocol (BGP) Six Neighbor States. 33:36 33:36
- Lecture-75:Border Gateway Protocol (BGP) Four Message Types. 17:44 17:44
- Lecture-76:Border Gateway Protocol (BGP) Multihop & Update-Source. 17:53 17:53
- Lecture-77:Border Gateway Protocol (BGP) Keepalive & Hold-Down Timers. 28:08 28:08
- Lecture-78:Border Gateway Protocol (BGP) Next-Hope-Self Command. 19:45 19:45
- Lecture-79:Border Gateway Protocol (BGP) Synchronization Command. 38:18 38:18
- Lecture-80:Border Gateway Protocol (BGP) Attributes Theory. 23:47 23:47
- Lecture-81:Border Gateway Protocol (BGP) Best Path Selection Theory. 50:28 50:28
- Lecture-82:Border Gateway Protocol (BGP) Best Path Selection Lab. 01:00:03 01:00:03
- Lecture-83:Introduction and Concept of Network Address Translation. 22:01 22:01
- Lecture-84:Configure and Verify Network Address Translation & PAT. 33:07 33:07
- Lecture-85:Introduction and Concept of Debug and Conditional Debug. 21:32 21:32
- Lecture-86:Introduction and Concept of Ping and Traceroute Command. 19:39 19:39
- Lecture-87:Configure and Verify SNMP Version 2 and SNMP Version 3. 31:54 31:54
- Lecture-88:Configure and Verify Syslog (Logging) in Cisco Router. 31:16 31:16
- Lecture-89:Introduction and Concept of Network Time Protocol (NTP). 12:14 12:14
- Lecture-90:Configure and Verify Network Time Protocol and Security. 55:11 55:11
- Lecture-91:Configure and Verify IP SLA (Service Level Agreement). 29:56 29:56
- Lecture-92:Interpret Basic Python Scripts Network Automation Lab. 28:26 28:26
- Lecture-93:Introduction to Application Programming Interface API. 06:44 06:44
- Lecture-94:NETCONF Application Programming Interface Theory & Lab. 29:17 29:17
- Lecture-95:RESTCONF Application Programming Interface Theory & Lab. 12:06 12:06
- Lecture-96:Introduction and Concept of Software Defined Networking. 15:08 15:08
- Lecture-97:Introduction to North Bound API and South Bound API. 04:46 04:46
- Lecture-98:Introduction & Concept of Cisco DNA Center (Cisco DNAC). 14:25 14:25
- Lecture-99:Introduction to JSON (JavaScript Object Notation) and Lab. 33:17 33:17
- Lecture-100:Introduction and Concept of Data Modeling Language, YANG. 13:06 13:06
- Lecture-101:Compare Agent,Agentless,Chef,Puppet,Ansible and SaltStack. 27:40 27:40
- Lecture-102:Configure and Verify EEM Applet to Automate Configuration. 26:09 26:09
- Lecture-103:Introduction and Concept of Cisco NetFlow Theory. 25:41 25:41
- Lecture-104:Configure and Verify Cisco NetFlow and Top-Talkers Lab. 31:15 31:15
- Lecture-105:Configure and Verify Lines and password protection. 33:25 33:25
- Lecture-106:Introduction, Theory and Concept of AAA Server. 14:59 14:59
- Lecture-107:Configure and Verify Device Administration Lab. 41:19 41:19
- Lecture-108:Configure and Verify Control Plane Theory and Lab. 28:45 28:45
- Lecture-109:Components of Network Security Design Threat Defense. 13:33 13:33
- Lecture-110:Components of Network Security Design Endpoint Security. 05:34 05:34
- Lecture-111:Introduction to Firewall Technologies and Types. 20:39 20:39
- Lecture-112:Introduction, Theory and Concept of TrustSec, MACsec. 04:08 04:08
- Lecture-113:Introduction and Concept of 802.1X (Dot1x) & Components. 13:53 13:53
- Lecture-114:Introduction to Media Access Control Authentication Bypass. 07:03 07:03
- Lecture-115:Introduction to Central Web Authentication (CWA). 07:00 07:00
- Lecture-116:Introduction, Theory and Concept of Access Control List ACL. 14:39 14:39
- Lecture-117:Configure and Verify Standard Access Control List ACL Lab. 28:21 28:21
- Lecture-118:Configure and Verify Extended Access Control List ACL Lab. 22:25 22:25
- Lecture-119:Configure and Verify Named Access Control List ACL Lab. 11:57 11:57
- Lecture-120:Configure & Verify Time-Based Access Control List ACL Lab. 11:08 11:08
- Lecture-121:Configure & Verify Infrastructure Access Control List Lab. 11:49 11:49
- Lecture-122:Describe Device Virtualization Technologies Hypervisor,VM. 26:08 26:08
- Lecture-123:Introduction and Concept of Generic Routing Encapsulation. 08:29 08:29
- Lecture-124:Configure and Verify Generic Routing Encapsulation GRE. 23:40 23:40
- Lecture-125:Configure and Verify Cisco VRF Lite Theory and Lab. 33:09 33:09
- Lecture-126:Introduction, Theory and Concept of VXLAN and LISP Protocol. 26:33 26:33
- Lecture-127:Differentiate Between On-Premises and Cloud Infrastructure. 23:26 23:26
- Lecture-128:Describe Multicast Protocols, Such as PIM and IGMP v2/v3. 31:31 31:31
- Lecture-130:Introduction, Theory and Concept of Quality of Service QoS. 53:25 53:25
- Lecture-131:Configure and Verify Quality of Service QoS Shaping Lab. 26:05 26:05
- Lecture-132:Configure and Verify Quality of Service QoS Policing Lab. 10:54 10:54
- Lecture-133:Configure and Verify Quality of Service Classification Lab. 16:55 16:55
- Lecture-134:Configure and Verify Quality of Service QoS Marking Lab. 06:24 06:24
- Lecture-135:Introduction and Concept of 2 Teir and 3 Teir Architectures. 14:03 14:03
- Lecture-136:Introduction and Concept of SDN, SD-WAN and SD-Access. 15:32 15:32
- Lecture-137:Introduction and Concept of Wireless Basic & Terminologies. 22:59 22:59
- Lecture-138:Introduction and Concept of Wireless Deployment Models. 08:10 08:10
- Lecture-139:Introduction and Concept of AP, AP Categories and AP Modes. 17:22 17:22
- Lecture-141:Introduction and Concept of Antennas and Types of Antennas. 06:17 06:17
- Lecture-142:Introduction and Concept of WLC & First Time Configuration. 24:23 24:23
- Lecture-143:Configure and Verify Wireless Lab in Cisco Packet Tracer. 22:23 22:23
- Lecture-144:Introduction and Concept of Wireless Security Features. 06:24 06:24
Instructor Details
Ahmad Ali
About me
I am a Cyber Security Consultant and Certified Trainer with several years of experience. For over a decade, I have been teaching part-time, delivering comprehensive training sessions both in person and online. My expertise spans a variety of networking and security topics.
My goal as an instructor is to bring my real-world experience into the classroom, helping you gain practical skills that you can apply in your career. Whether you're new to networking or looking to advance your skills, I'm here to help you succeed. Let's learn together!
Certifications:
CCIE Routing and Switching
Cisco Certified Specialist - Web Content Security Certificate
Cisco Certified Specialist - Security Identity Management Implementation Certificate
Cisco Certified Specialist - Security Core Certificate
Cisco Certified Specialist - Network Security VPN Implementation
Cisco Certified Specialist - Network Security Firepower Certificate
Cisco Certified Specialist - Enterprise Core Certificate
Cisco Certified Specialist - Enterprise Advanced Infrastructure Implementation Certificate
Cisco Certified Network Professional CCNP (Routing & Switching)
Cisco Certified Network Associate CCNA (Routing & Switching)
Cisco Certified Network Professional CCNP (Security)
Cisco Certified Network Associate CCNA (Security)
Cisco Certified Academy Instructor CCAI
Microsoft Certified Solutions Associate MCSA Server 2012
Microsoft Certified Solutions Associate MCSA Server 2008
Microsoft Certified IT Professional MCITP Server 2008
Microsoft Certified Technology Specialist MCTS Windows 7
Microsoft Certified Technology Specialist MCTS 2008
Microsoft Technology Associate MTA
EC-Council Certified Secure Computer User CSCU
Palo Alto Networks Certified Network Security Engineer (PCNSE)
Palo Alto Accredited Configuration Engineer (ACE)
EC-Council Certified, Certified Ethical Hacker (CEH)
Fortinet NSE1, NSE2, NSE3,NSE4,NSE5,NSE6 and NSE7
F5 Certified BIG-IP Administrator
Course Certificate
Use your certificate to make a career change or to advance in your current career.
Our students work
with the Best
Related Video Courses
View MoreAnnual Membership
Become a valued member of Tutorials Point and enjoy unlimited access to our vast library of top-rated Video Courses
Subscribe nowOnline Certifications
Master prominent technologies at full length and become a valued certified professional.
Explore Now